Research & Development

Research &
Development

We perform targeted security research of: browsers, client-server applications, operating systems and devices. Additionally we develop security software to aid both red team and blue team operations.

Get a quote

See the Competencies of Our Team

Our team identified and responsibly disclosed multiple critical and high rated vulnerabilities in popular global utilized products. We received acknowledgements eg. from the following organisations:

Adobe
Mozilla
Microsoft
Oracle
Apple
Google

Security Research

Mostly we deliver non-standard, tailored solutions for demanding customers. Our services include targeted security research of: browsers, client-server applications, operating systems and various devices (mobile, IT/OT/IoT). We develop custom software for our customers for both offensive and defensive purposes.

Security vulnerabilities

Sample security bugs in popular software identified by our core team:

Targeted security research

Our vast experience in identifying security vulnerabilities is confirmed by acknowledgments by such companies as Apple, Google or Microsoft. Apart from that we have experience working as security researchers. Due to the nature of this work most of it is not public and only some of those are confirmed with CVE identifiers. We have identified multiple vulnerabilities in top browsers, server applications, web/mobile applications, embedded devices and operating systems. Our team specializes in delivering dedicated research in order to discover previously unidentified security flaws and develop new techniques. We are able to identify vulnerabilities in both open and closed source software. Our main areas of expertise are:

  • Browser security (Desktop & mobile)
  • OS Security (Windows, Linux, MacOS)
  • Web & mobile security
  • Network devices / embedded systems security

Fuzzing

Many of the bugs identified by us were found by using fuzzing. We have several years of experience in creating dedicated fuzzing software that is used for identified so called 0-day vulnerabilities and are able to provide custom solutions to our customers. The fuzzer can for example target specific software, module or a network protocol. We can also help with optimizing already existing solutions that are based on popular public fuzzing solutions such as American Fuzzy Lop (AFL) or Peach Fuzzer.

Other non standard IT Security Services

Thanks to our broad experience in the cybersecurity field, we can offer many non standard offensive and defensive services. In case a service was not listed on the website or you have some special requirements feel free to contact us.

Explore Our Offer

We deliver advanced technical consulting services covering multiple aspects of cybersecurity from red team to blue team. Thanks to a diverse experience in IT security we are able to look at a wider perspective during engagements. Our abilities come from many years of work experience in cybersecurity and are confirmed with certificates, publications, advisories and references from our customers.